Spotting Intrusion Scenarios From Firewall Logs Through a Case-Based Reasoning Approach
Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-540-30184-4_17
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2004
Authors
Publisher
Springer Berlin Heidelberg